Sciweavers

529 search results - page 43 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
IAT
2008
IEEE
14 years 2 months ago
An Ontology-Driven Framework for Deploying JADE Agent Systems
Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 7 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
ACIVS
2007
Springer
13 years 11 months ago
A Multi-agent Approach for Range Image Segmentation with Bayesian Edge Regularization
Abstract. We present and evaluate in this paper a multi-agent approach for range image segmentation. The approach consists in using autonomous agents for the segmentation of a rang...
Smaine Mazouzi, Zahia Guessoum, Fabien Michel, Moh...
ACMSE
2006
ACM
14 years 1 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
13 years 11 months ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit